Latest news
Check out our recent blogs and announcements to stay current
on the latest product and solution updates!
This Email Sounds Like It Came From Your Boss. But It Didn’t.
The red flags of email impersonation, real world examples and what to do about it.
Email impersonation remains one of the most persistent threats in cybersecurity. In this blog, I’ll walk through how impersonation attacks have developed over time, the techniques attackers use today and how you can protect your business from becoming a target.
But what exactly is email impersonation?
3 SSE Adoption Principles to Live By
How to overcome hidden hurdles and accelerate adoption, as told by Broadcom experts
Security Service Edge (SSE) transformations are complex, but they don’t have to be painful. The best way to ensure success is to go to the experts—the SSE veterans who’ve seen every misstep and triumph in the book—so that you can anticipate hurdles and set the straightest path to a smooth and successful adoption.
We’ve summarized a few of the webinar’s critical takeaways below.
Using AI to Predict, Stop and Recover from the Next Ransomware Incident
Introducing Incident Prediction, an industry-first capability that can accurately predict an attackers’ next four or five moves with up to 100% confidence
Our research has found that a large number of attackers use legitimate software, in an approach known as living off the land (LOTL) techniques, to carry out their attacks. Malware tends to be deployed sparingly and may only appear at the conclusion of an attack (such as when a ransomware payload is deployed).
How To Optimize Your Data Pipelines For Business Outcomes
In his latest piece for the Forbes Technology Council, Serge Lucio lays out a clear case for why optimized data pipelines are critical not just for IT, but for real business outcomes. From missed SLAs to compliance risks and alert fatigue, fragmented data operations cost time, trust and money.
TCP Monitoring With AppNeta: Why Expanded Support is a Game Changer
Broadcom continues to expand the capabilities of AppNeta by Broadcom, offering ongoing enhancements in features and value. With the introduction of TCP protocol support, users can now achieve more streamlined setup processes and deeper visibility into modern network paths. These enhancements help eliminate blind spots and improve monitoring accuracy across complex network environments.
SMS OTPs Aren’t As Secure As You Think
Why It's Time for a Change
In today's digital world, passwords comprise the default security protection for most users and accounts, and SMS one-time passwords (OTPs) are a popular way to add a second form of authentication. But attackers know this, and SMS OTPs aren’t keeping up with the latest techniques. Despite their widespread use, SMS OTPs are leaving businesses exposed to a host of threats.
Your Guide to Data Governance in an AI-Driven World
AI tools will be used in your work—here’s how to make them safe
With organizations of all sizes rushing to deploy AI platforms to streamline workflows and even assign tasks to AI agents, concerns about data governance should be top of mind for security teams.
How can organizations use AI tools without putting their data at risk?
Broadcom is proud to be positioned as the Top Leader in the 2025 Radicati Market Quadrant report for DLP
Too many strengths to list but also wanted to call out "Symantec offers a broad portfolio of data security solutions, it can be somewhat complex to manage for organizations with fewer resources. However, organizations can work with regional delivery partners (i.e. Catalyst partner network) to access DLP expertise."
Symantec Endpoint Security Complete Earns 100% in SE Labs' 2024 Enterprise Advanced Security Test
SESC catches every single move in real-world attack simulations
In this annual comparative test, SE Labs evaluated industry-leading endpoint security solutions in their abilities to detect a range of attacks inspired by APT29, Scattered Spider and DPRK Ransomware. SESC was one of only two products to detect 100% of the steps from each attack—meaning analysts could see every move in the SESC admin console, no matter which method an attacker used.
Why European Businesses Are Choosing Self-Managed Identity Solutions
As Europe’s digital ecosystem continues to evolve, businesses are facing a critical decision for their IT infrastructures. Increasingly, more European-based organizations are favoring self-managed modern-architecture applications to meet their needs—especially when it comes to new regulatory trends and compliance demands.
Carbon Black is Moving To Google Cloud
4 reasons why you should care about our migration
When performance, scale and integration align, great things happen. That’s why Carbon Black is uniting with Symantec on Google Cloud; a pivotal step in Broadcom’s long-standing partnership with Google to gear up for future innovations—while delivering immediate benefits for our customers and partners.
Automation Analytics & Intelligence
A Game-Changer for IT Operations
Broadcom’s Automation Analytics & Intelligence (AAI) is the only analytics and SLA governance solution that provides true end-to-end visibility and predictive insights across your workload automation platforms.
Whether you run these products individually or you have a mix of solutions, with AAI, you can take control of your entire automation landscape.